Distributed Denial of Service Attacks in Mobile Adhoc Networks

The aim of this paper is to explore the security issues that significantly affect the performance of Mobile Adhoc Networks (MANET)and limit the services provided to their intended users. The MANETs are more vulnerable to Distributed Denial of Service attacks (DDoS) because of their properties like shared medium, dynamic topologies etc. A DDoS attack is a coordinated attempt made by malicious users to flood the victim network with the large amount of data such that the resources of the victim network are exhausted resulting in the deterioration of the network performance. This paper highlights the effects of different types of DDoS attacks in MANETs and categorizes them according to their behavior.




References:
[1] Hoang Lan Nguyen, Uyen Trang Nguyen "A study of different types of
attacks on multicast in mobile ad hoc networks" Ad Hoc Networks vol 6,
page no. 32-46, 2008.
[2] Christos Douligeris and Aikaterini Mitrokotsa "DDOS ATTACKS AND
DEFENSE MECHANISMS: A CLASSIFICATION
[3] Arun Raj Kumar, P. and S. Selvakumar"Distributed Denial-of-Service
(DDoS) Threat in Collaborative Environment- A Survey on DDoS
Attack Tools and Traceback Mechanisms" IEEE International Advance
Computing Conference (IACC 2009)India, 6-7 March 2009.
[4] Sven Ehlert , Dimitris Geneiatakis , Thomas Magedanz "Survey of
network security systems to counter SIP-baseddenial-of-service attacks",
journal of computers &Security vol 29, page no. 2 2 5 - 2 4 3 Year
2010.
[5] TAO PENG, CHRISTOPHER LECKIE, and KOTAGIRI
RAMAMOHANARAO, "Survey of Network-Based Defense
Mechanisms Counteringthe DoS and DDoS Problems". ACM
Computing Surveys, Vol. 39, No. 1, Article 3, Year 2007.
[6] Jarmo Möls├ñ, "Mitigating denial of service attacks: A tutorial" Journal
of Computer Security Vol.13 Page no. 807-837 IOS Press , Year 2005.
[7] Charalampos Patrikakis, Michalis Masikos, and Olga Zouraraki,
"Distributed Denial of Service Attacks" The Internet Protocol Journal-
Vol. 7 no. 4 Dec. 2004.
[8] K.J. Houle, G.M. Weaver, N. Long and R. Thomas, Trends in Denial of
Service Attack Technology. CERT Coordination Center, Oct. 2001.
[Online] Available: http://www.cert.org/archive/pdf/ DoS_trends.pdf.
[9] J. Mirkovic and P. Reiher, A taxonomy of DDoS attack and DDoS
defense mechanisms, ACM SIGCOMMComputer Communication
Review 34, vol. 2page no. 39-53, year 2004.